TrueMedia.org web application for querying multiple deepfake detection models and analyzing results
☆23Jan 24, 2025Updated last year
Alternatives and similar repositories for deepfake-app
Users that are interested in deepfake-app are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆15Apr 19, 2026Updated 2 weeks ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- A verification “Swiss army knife” helping journalists, fact-checkers, and human rights defenders to save time and be more efficient in th…☆48Updated this week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 6 months ago
- Display USGS Watershed maps on a Node-RED Dashboard with Water Quality Reports☆11Jun 9, 2020Updated 5 years ago
- ⚡ ReconNinja v8.2.1 — 38-phase recon framework for pentesters & bug bounty hunters. Subdomain enum → port scan → web recon → WAF/CORS/JS/…☆38Updated this week
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- Offensive Security & Red Teaming Labs and Projects☆27Aug 26, 2025Updated 8 months ago
- ☆22Mar 30, 2026Updated last month
- ☆13May 26, 2023Updated 2 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆22Mar 24, 2020Updated 6 years ago
- A collection of SoftLayer API examples in a variety of languages☆14Mar 26, 2026Updated last month
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 5 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- Turn a standard Raspbian Lite install into a tor-ified wifi access point☆14Aug 3, 2017Updated 8 years ago
- Virtual Lab Automation☆18Jun 25, 2025Updated 10 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- PDF_Tools es una extensión para Google Chrome que integra potentes herramientas para unir y dividir archivos PDF directamente en un moder…☆30Jan 5, 2026Updated 4 months ago
- OWASP Foundation Web Respository☆12Apr 21, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- A cryptographically secure password generator that provides high-entropy passwords with configurable requirements. Uses platform-native c…☆23Oct 25, 2024Updated last year
- ☆31Feb 28, 2025Updated last year
- This repository contains a general list of how to items for any language similar to gist style articles but focused in a repo☆23Updated this week
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Test résumés and CVs in FRESH (and JSON Resume!) formats.☆10Feb 8, 2018Updated 8 years ago
- Architecture of Twint scrapper which allow download tweets on many instances without api restrictions☆10Nov 30, 2020Updated 5 years ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆32Feb 19, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year
- RPGLE runtime for .NET Core☆24Jun 22, 2022Updated 3 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- Webservice Utilities running on IBM i for providing superfast Web Services and running Web Applications powered by AJAX☆22Nov 25, 2021Updated 4 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Express API documentation generator☆10Jul 19, 2019Updated 6 years ago